First published: Wed Mar 08 2023(Updated: )
Jenkins update-center2 3.13 and 3.14 renders the required Jenkins core version on plugin download index pages without sanitization, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide a plugin for hosting.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Update-center2 | =3.13 | |
Jenkins Update-center2 | =3.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Jenkins update-center2 vulnerability is CVE-2023-27905.
The severity of CVE-2023-27905 is critical with a severity value of 9.6.
CVE-2023-27905 is a stored cross-site scripting (XSS) vulnerability in Jenkins update-center2 3.13 and 3.14, which allows attackers to exploit it by providing a plugin for hosting.
Jenkins update-center2 3.13 and 3.14 are affected by CVE-2023-27905.
To fix CVE-2023-27905, upgrade to a version of Jenkins update-center2 that is not affected by the vulnerability.